GCVE-VVD-MAGEIA-2025-201
Advisory Published
Vulnetix · Advisory published July 2, 2025
CVE-2025-6424: A use-after-free in FontFaceSet resulted in a potentially exploitable crash. CVE-2025-6425: An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. CVE-2025-6429: Firefox could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an embed tag. This could have bypassed website security checks that restricted which domains users were allowed to embed. CVE-2025-6430: When a file download is specified via the Content-Disposition header, that directive would be ignored if the file was included via a <embed> or <object> tag, potentially making a website vulnerable to a cross-site scripting attack. We can't yet ship this update to the armv7hl architecture; we are investigating the issue and will try to update firefox for armv7hl as soon as possible.

Affected Products

VendorProductVersionsPlatforms
Mageiafirefox0 (affected), 128.12.0-1.1.mga9 (unaffected)
Mageiafirefox-l10n0 (affected), 128.12.0-1.1.mga9 (unaffected)
Mageiarootcerts0 (affected), 20250613.00-1.mga9 (unaffected)
Mageianss0 (affected), 3.113.0-1.mga9 (unaffected)

References

Browse GCVE Records

100 records in the GCVE database · Updated April 16, 2026

No matching records found.

Explore Further

Investigate this vulnerability in the interactive console or download the raw GCVE record.